Title: The Application of Public Key Cryptography to Network Security
1The Application of Public Key Cryptography to
Network Security
- Ted Reinhardt
- reinhardt_at_ncf.ca
- Course 94.470
2Learning Objectives
- Understand how public key cryptography can be
used to provide network security services such
as - Confidentiality
- Non-repudiation
- Authentication
- Notarization
3Crypto System
- a pair of data transformations
- one encrypts
- the other decrypts
Encrypt
Decrypt
cipher text
plain text
plain text
key
key
4- Encryption
- Ek(m) ? c
- m ? plain text message
- c ? cipher text
- k ? key
- Decryption
- Dk(c) ? m
- c ? ciphertext
- m ? message
- k ? key
5Symmetric Key Crypto System
- same key is used for both transformations
A B C D E F G H I J K L M N O P Q R S T U V W X Y
Z Z A B C D E F G H I J K L M N O P Q R S T U V W
X Y
HAL
IBM
IBM
plain text
Encrypt
Decrypt
ciphertext
plain text
Key1
Key1
6A word about symmetric key crypto systems
- Keys must be protected at all times at least to
the highest level of the information exchanged
for the entire useful life of the message. - Key distribution is therefore expensive
- Keys must be changed frequently
- large symmetric crypto networks are a nightmare
to manage
7Symmetric Algorithms
Rijndael
- Rijndael
- RC6
- Twofish
- Casear
- RC4
- CAST
- DES
- Triple DES
8Public Key Crypto System
- a pair of data transformations
- one encrypts
- the other decrypts
03422AFDS
IBM
IBM
Encrypt
Decrypt
ciphertext
plain text
plain text
public key
private key
9An Engineering Love StoryOur Cast of Players
Carl
A spy for a tabloid newspaper
Bob
Alice
Totally Clueless
Hopelessly in love with Bob
10Public Key Crypto System
- complementary key pairs
- one private key, and a corresponding public key
Name Public Private Alice 7 13 Bob 11 23 Carl 71
53
Private !!!
11Public Key Crypto System
Name Public Private Alice 7 13 Bob 11 23 Carl 71
53
- Alice encrypts message for Bobs eyes only.
Bobs Public Key 11
Bobs Private Key 23
plain text
Alice Encrypt
Bob Decrypt
cipher text
plain text
I LOVE YOU
_at_deew
I LOVE YOU
Sender to Receiver Confidentiality
12Public Key Crypto System
Name Public Private Alice 7 13 Bob 11 23 Carl 71
53
- Bob encrypts message for Alices eyes only.
Alices Public Key 7
Alices Private Key 13
plain text
Bob Encrypt
Alice Decrypt
ciphertext
plain text
Sender to Receiver Confidentiality
13Confidentiality - Objective 1
- Sender to Receiver Confidentiality
- Encrypt with Public Key of the Addressee
- Equivalent to sealing an envelope by encrypting
- Only the Receiver can decode with his own Private
Key (as long as the Private Key is kept Private).
14Public Key Cryptosystem
Name Public Private Alice 7 13 Bob 11 23 Carl 71
53
- Alice digitally signs message for Bob
Alices Public Key 7
Alices Private Key 13
plain text
Alice Encrypt
Bob Decrypt
cipher text
plain text
Authentication / Digital Signature
15Authentication Non-Repudiation Objective 2
- Sender encrypts message with own private key
- Receiver decrypts message with senders public
key. - Correct decryption indicates the message is
authentic.
16Public Key Crypto System
Name Public Private Alice 7 13 Bob 11 23 Carl 71
53
- Alice signs and seals message for Bob
Bobs Public Key 11
Alices Private Key 13
Ciphered Ciphertext
Alice Encrypt
Alice Encrypt
ciphertext
plain text
Seal
Sign
Combined Digital Signature and Encryption
17Public Key Crypto System
Name Public Private Alice 7 13 Bob 11 23 Carl 71
53
- Bob unseals message, and authenticates it
Alices Public Key 7
Bobs Private Key 23
clear text
Bob Decrypt
Bob Decrypts
message signature
Ciphered cipher text
Opens
Combined Decryption and Authentication
18Blind Notarization
- Alice encrypts and signs a message for Bobs Eyes
Only - Alice sends the message to Carl who takes Alices
encrypted and signed message, adds a date time
stamp (11AM 20 Sep 2004), and then signs it. - Bob can decode it and check the date time if
there is a dispute.
19Blind Notarization
Notary Services
Date-time stamp Notarys Signature
Alice
Signed by Alice Sealed for Bobs Eyes Only
Bob
20Vulnerability in Key Management
- Certification of Public Keys is required
otherwise subject to middle man attack.
Name Public Private Alice 71 53 Bob 71 23 Carl 71
53
Carl can now masquerade as Alice
Carl can now read the message and then
re-encrypt for the intended receiver
21Solution to VulnerabilityCertificate Authority
- Certification of Public Keys is required
otherwise subject to middle man attack.
Digitally Signed by the CA
Alice Public Key13 Expiry10-Aug-2004
Certificate Authority is recognized by all parties
22Symmetric vs Asymmetric
- Public Key Crypto
- Simplifies Key Management
- Slow
- Provides Digital Signature
- Symmetric Key Crypto
- Black Bag Key Management
- Fast
23HybridBest of Both Worlds
- Use Symmetric Key as session key to encrypt data
using Symmetric Key Cryptography - it is faster
- Use Public Key to Encrypt Session Key
- fewer key management problems
24Message Digest
- A one way function that provides a unique hash
based on a data stream input - MD5
- SHA-1
25Message Digests
26Signature and Integrity Implementation
Plain text
Message Digest
Plain text
Message Digest
Digest
Digest
Digitally Sign
Signed Digest
Integrity
COMPARE
27Practicalities of Implementation
Plain text
Symmetric Encryption
Cipher text
Random Session Key
Alices Pub Key
Public Key Encryption
Alices Session Key
Bobs Pub Key
Public Key Encryption
Bobs Session Key
28Layer 3Virtual Private Network
Alice
VPN Gateway
Internet
Directory
Certificate Authority
VPN Gateway
Bob
29Layer 4Secure Sockets LayerTransport Layer
Security
SSL Appliance
Protected Web Server
Firewall
Tunnel
Internet
SSL Enabled Browser
30Issues
- Who is going to be the CA
- How does a CA decide to trust another CA
- If someone is no longer ok, how do you revoke
their credentials and distribute the info - What is the basis for trust
- Certificate Policies, Certificate Practice
Statements
31Issues
- What is required to make a legally binding
transaction? - Where do you store the private key?
- Key Escrow --- can someone backup your key for
you in the event of loss? - How do you authenticate people far away the first
time? - What algorithms are ok to use?
32References
- RSA FAQ http//www.rsa.com/rsalabs/faq/
- www.entrust.com Developer Toolkit
- www.counterpane.com Cryptogram News
- Cryptography and Data Security (D. Denning)
- Applied Cryptography (B. Schneier)
- Communications Security (W. Ford)